Querying Encrypted Data

被引:0
|
作者
Arasu, Arvind [1 ]
Eguro, Ken [1 ]
Kaushik, Raghav [1 ]
Ramamurthy, Ravi [1 ]
机构
[1] Microsoft Res, Bangalore, Karnataka, India
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data security is a serious concern when we migrate data to a cloud DBMS. Database encryption, where sensitive columns are encrypted before they are stored in the cloud, has been proposed as a mechanism to address such data security concerns. The intuitive expectation is that an adversary cannot "learn" anything about the encrypted columns, since she does not have access to the encryption key. However, query processing becomes a challenge since it needs to "look inside" the data. This tutorial explores the space of designs studied in prior work on processing queries over encrypted data. We cover approaches based on both classic client-server and involving the use of a trusted hardware module where data can be securely decrypted. We discuss the privacy challenges that arise in both approaches and how they may be addressed. Briefly, supporting the full complexity of a modern DBMS including complex queries, transactions and stored procedures leads to significant challenges that we survey.
引用
收藏
页码:1262 / 1263
页数:2
相关论文
共 50 条
  • [1] Querying Encrypted Data
    Arasu, Arvind
    Eguro, Ken
    Kaushik, Raghav
    Ramamurthy, Ravi
    [J]. SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 1259 - 1261
  • [2] Querying Encrypted OLAP Data
    Cuzzocrea, Alfredo
    Grasso, Giorgio Mario
    [J]. 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 161 - 163
  • [3] Security issues in querying encrypted data
    Kantarcioglu, M
    Clifton, C
    [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 325 - 337
  • [4] An Improved Algorithm for Querying Encrypted Data in the Cloud
    Shastri, Samraddhi
    Kresman, Ray
    Lee, Jong Kwan
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 653 - 656
  • [5] A Survey on Querying Encrypted Data for Database as a Service
    Ravan, Rama Roshan
    Idris, Norbik Bashah
    Mehrabani, Zahra
    [J]. 2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 14 - 18
  • [6] Design and analysis of querying encrypted data in relational databases
    Canim, Mustafa
    Kantarcioglu, Murat
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 177 - +
  • [7] Model Design on DAS and Research of XML Encrypted Data Querying
    Xia Shi-xiong
    Ke Yu-Yi
    Wang Chu-jiao
    [J]. 2009 SIXTH WEB INFORMATION SYSTEMS AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2009, : 32 - 36
  • [8] Querying encrypted XML documents
    Jammalamadaka, Ravi Chandra
    Mehrotra, Sharad
    [J]. 10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 129 - 136
  • [9] Querying Encrypted Graph Databases
    Aburawi, Nahla
    Lisitsa, Alexei
    Coenen, Frans
    [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 447 - 451
  • [10] Preparations for encrypted XML metadata querying
    Feng, L
    Jonker, W
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2004, 19 (03): : 163 - 171